[go: up one dir, main page]

EP2439637A1 - Method and system of providing access to a virtual machine distributed in a hybrid cloud network - Google Patents

Method and system of providing access to a virtual machine distributed in a hybrid cloud network Download PDF

Info

Publication number
EP2439637A1
EP2439637A1 EP10186913A EP10186913A EP2439637A1 EP 2439637 A1 EP2439637 A1 EP 2439637A1 EP 10186913 A EP10186913 A EP 10186913A EP 10186913 A EP10186913 A EP 10186913A EP 2439637 A1 EP2439637 A1 EP 2439637A1
Authority
EP
European Patent Office
Prior art keywords
network
virtual machine
internal
data connection
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
EP10186913A
Other languages
German (de)
French (fr)
Inventor
Philipp Offermann
Marten Schönherr
Maximilian Ahrens
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Technische Universitaet Berlin
Deutsche Telekom AG
Zimory GmbH
Original Assignee
Technische Universitaet Berlin
Deutsche Telekom AG
Zimory GmbH
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Technische Universitaet Berlin, Deutsche Telekom AG, Zimory GmbH filed Critical Technische Universitaet Berlin
Priority to EP10186913A priority Critical patent/EP2439637A1/en
Publication of EP2439637A1 publication Critical patent/EP2439637A1/en
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4641Virtual LANs, VLANs, e.g. virtual private networks [VPN]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/485Task life-cycle, e.g. stopping, restarting, resuming execution
    • G06F9/4856Task life-cycle, e.g. stopping, restarting, resuming execution resumption being on a different machine, e.g. task migration, virtual machine migration
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • G06F9/5077Logical partitioning of resources; Management or configuration of virtualized resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/508Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement
    • H04L41/5096Network service management, e.g. ensuring proper service fulfilment according to agreements based on type of value added network service under agreement wherein the managed service relates to distributed or central networked applications
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/40Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using virtualisation of network functions or resources, e.g. SDN or NFV entities

Definitions

  • the present invention relates to a method and a system for hybrid cloud distributed virtual machine management services over a virtual private network.
  • a virtual private network i.e. a VPN is a computer network layered on top of an underlying computer network.
  • VPN connection can be envisioned as a "pipe within a pipe", with the outer pipe being the underlying network connection.
  • OSI Reference Model layer 3 is an abstract description for layered communications and computer network protocol design. It was developed as part of the Open Systems Interconnection initiative. In its most basic form, it divides network architecture into seven layers which, from top to bottom, are the Application, Presentation, Session, Transport, Network, Data Link, and Physical Layers. It is therefore often referred to as the OSI Seven Layer Model.
  • OSI layer 3 For achieving transparent tunnelling from the OSI layer 3 perspective, i.e. network layer, a VPN has to be created on OSI layer 2, i.e. data link layer. Thereby, the tunnelling is transparent from the user perspective, as the same IP address space can be used.
  • Common protocols are Multiprotocol Label Switching, MPLS and Layer 2 Tunnelling Protocol, L2TP.
  • MPLS is a mechanism in high-performance telecommunications networks which directs and carries data from one network node to the next. MPLS makes it easy to create "virtual links" between distant nodes. It can encapsulate packets of various network protocols. MPLS is a highly scalable, protocol agnostic, data-carrying mechanism. In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself. This allows one to create end-to-end circuits across any type of transport medium, using any protocol. The primary benefit is to eliminate dependence on a particular Data Link Layer technology, such as ATM, frame relay, SONET or Ethernet, and eliminate the need for multiple Layer 2 networks to satisfy different types of traffic.
  • Data Link Layer technology such as ATM, frame relay, SONET or Ethernet
  • L2TP is a tunnelling protocol used to support VPNs. It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy.
  • the entire L2TP packet, including payload and L2TP header, is sent within a UDP datagram. It is common to carry Point-to-Point Protocol (PPP) sessions within an L2TP tunnel.
  • PPP Point-to-Point Protocol
  • L2TP does not provide confidentiality or strong authentication by itself.
  • IPsec is often used to secure L2TP packets by providing confidentiality, authentication and integrity. The combination of these two protocols is generally known as L2TP/IPsec.
  • servers are used. For resource efficiency reasons, these servers can be virtualised. Virtualisation is based on a virtual machine monitor software component, which runs on the server hardware and virtualises physical resources, thereby offering guest system an environment that looks like a physical host from the guest systems point of view. It allows running multiple operating systems and their applications on the same physical server, on top of the virtual machine monitor. Each operating system and its applications are said to be running within a virtual machine, VM. Common technologies used as virtual machine monitors are Xen and VMware. If VMs are to be run internal to a company/government body, the hardware resources running the VMs have to be provided internally. Otherwise, VMs can be run by third parties and accessed over a public network, e.g. the Internet.
  • the management functionalities include an authentication and authorization system, the ability to create, start, stop and delete VMs as well as to migrate VMs from one data centre to another.
  • Creating a virtual machine involves generating an image of a hard disk that is bootable and configuring a virtual machine environment with parameters like vCPUs, RAM, network configuration and computing power.
  • Starting a VM involves creating a virtual machine environment on the host system and booting an image in this environment.
  • Stopping a VM involves shutting down a guest system running and destroying the virtual machine environment.
  • Deleting a virtual machine involves deleting the disk image and the environment configuration.
  • Migrating a VM involves copying a hard disk image and the environment configuration from one host system to another.
  • Additional management functionalities are the definition of service level agreements, SLA and the assignment of an SLA to a VM as well as billing functionalities. Thereby, the user can run a VM in any connected data centre and migrate between the centres.
  • Such technology is available e.g. from Zimory GmbH, Eucalyptus Systems and the OpenNebula Project.
  • Cloud services are a service that is offered in a way that the used infrastructure is transparent to the user. For virtual machine management, this implies that the user is completely unaware of the underlying hardware infrastructure. This stands in contrast to conventional virtual machine management, where a virtual machine is explicitly provisioned on a specific physical host.
  • Hybrid cloud services combine physical resources that are publicly available on the Internet with resources that are internal to a company / government body.
  • VPN Virtual Private Network
  • EC2 Elastic Compute Cloud
  • VPC Virtual Private Cloud
  • US 2008/0201414 A1 relates to transferring a virtual machine from a remote server computer for local execution by a client computer. It concerns the transfer of a virtual machine to a client computer system and back to a server computer system.
  • EP 2 019 358 A1 relates a method and a system for the creation and deployment of a virtual machine appliance on virtualised servers. It describes a method and a system to efficiently create and deploy virtual machine appliances and includes a management portal being run on a management server. By using the method and system, speed and reliability of VM provisioning is improved.
  • EP 2 043 320 B1 relates to a method and a system for automatic and remote server provisioning using virtual machine appliances. It describes a method and a system for provisioning virtual machine appliances on remote systems. This is essential for hybrid cloud management, as VMs have to be deployed on distributed data centres.
  • US 2008/0222375 A1 describes a method and a system for quickly migrating a virtual machine appliance from one host to another. This is especially useful for fast VM migration between distributed data centres, as the time between stopping a machine and starting the migrated version can be minimised.
  • EP 1 962 192 A1 relates to a method and a system for transparent migration of virtual machine storage which is similar to US 2008/0222375 A1 .
  • JP 2009/064211 A1 describes a system that combines virtual machine technology with virtual private network.
  • the focus of the patent is on reducing the load of an application system.
  • US 2007/0211739 A1 relates to a system and a method for automated access to data management servers. To achieve this, virtual machines are used to establish VPN connections.
  • a virtual machine should be provisioned automatically according to the requirements.
  • the resources may be moved between physical host machines in different data centres, internal and external to a company, as required, seamlessly and transparent to the user and thereby to reduce the cost.
  • the invention provides a system and method that offers a company/government body the possibility to manage, migrate and access VMs in their intranet from the appliance itself, from internal virtualised resources and from third party providers as if they would be hosted in the intranet.
  • scalable CPU, RAM and storage resources can be provided transparently to the user, as if the resources were available on the intranet.
  • the present invention discloses a method of providing access to a virtual machine distributed in a hybrid cloud network, wherein the hybrid cloud network comprises an internal network having a first management component and an external network having a second management component, wherein the internal and external network being connected through a data connection over the internet, wherein the method comprises the steps of: a) tunnelling the data connection using an OSI layer 2 provider provisioned virtual private network; b) routing the access from the internal network to the virtual machine.
  • the method may further comprise the step of: maintaining an address list comprising a plurality of network addresses reserved to the internal network and to the first and the second management component, by the first management component.
  • the step b) further may comprise the step of: assigning a network address to the virtual machine.
  • the method may further comprise the step of: defining the location of the virtual machine according to network preference information.
  • the network preference information may comprise e.g. information about usage of the physical resources in the internal and external network and/or Quality of Service requirements for the data connection for hosting the access of the virtual machine.
  • the step b) further may comprise the steps of: b1) migrating the virtual machine from the external network to the internal network if the Quality of Service requirements of the virtual machine exceeds that the data connection provides, and managing the access from the internal network to the virtual machine in the internal network; or b1) migrating the virtual machine from the internal network to the external network if the usage of the physical resource in the internal network exceed a predefined value, and managing the access from the internal network to the virtual machine in the external network over the data connection.
  • the first or the second management component may assign a particular internet protocol address, i.e. IP address to the virtual machine.
  • IP address may be maintained unchanged even if the location of the virtual machine has been changed, e.g. the virtual machine has been migrated from the internal network to the external network due to the high load of the computer appliances hosting the virtual machine in the internal network, or the virtual machine has been migrated from the external network to the internal network because the available bandwidth of the data connection can not fulfil the requirement of the access to the virtual machine as defined by a user or in a service preference parameter.
  • the virtual machine may be dynamically distributed in the hybrid network - either in the internal network or in the external network, without the need of changing its IP address. The IP address of the virtual is therefore transparent to the end user.
  • the first management component comprises a first application programming interface
  • the second management component comprises a second application programming interface
  • a first and a second virtual private network router are located in the internal and the external network, respectively, and wherein the data connection is established between the first and the second virtual private network router.
  • the method may further comprise the steps of managing the Quality of Service of the data connection by the first and/or the virtual private network router.
  • the internal network is an intranet connecting an internal data centre
  • the external network is a third party network connecting a third party data centre.
  • the data connection is tunnelled using Multiprotocol Label Switching and/or Layer 2 Tunnelling Protocol.
  • the present invention also discloses a system for providing an access from an intranet to a virtual machine distributed in a hybrid cloud network, wherein the system comprises: at least a management component and at least a computer appliance for hosting the virtual machine.
  • the system is configured to be connectable to the intranet via a data connection over the internet.
  • the data connection is tunnelled by using an OSI layer 2 provider provisioned virtual private network.
  • the system is adapted to define the location of the virtual machine according to network preference information.
  • the network preference information may comprise e.g. information about usage of the physical resources in the intranet and the system and/or Quality of Service requirements for the data connection for hosting the access of the virtual machine.
  • the system is adapted to migrate the virtual machine from the system to the intranet if the Quality of Service requirements of the virtual machine exceeds that the data connection provides; and to manage the access from the intranet to the virtual machine in the intranet; or to migrate the virtual machine from the intranet to the system if the usage of the physical resource in the intranet exceed a predefined value; and to manage the access from the intranet to the virtual machine in the system over the data connection.
  • the present invention also discloses a system for providing an access to a virtual machine distributed in a hybrid cloud network, wherein the hybrid cloud network comprises an internal network and an external network, wherein the system comprises: a first and a second management component located in the internal and the external network, respectively; a data connection over the internet between the internal and external network.
  • the system is adapted to route the access to the virtual machine and the data connection being an OSI layer 2 provider provisioned virtual private network connection.
  • the system is adapted to maintain an address list comprising a plurality of network addresses reserved to the internal network and to the first and the second management component, by the first management component.
  • the system may be adapted to assign a network address to the virtual machine.
  • the system is adapted to define the location of the virtual machine according to network preference information.
  • the network preference information comprises information about usage of the physical resources in the intranet and the system and/or Quality of Service requirements for the data connection for hosting the access of the virtual machine.
  • the system is adapted to migrate the virtual machine from the external network to the internal network if the Quality of Service requirements of the virtual machine exceeds that the data connection provides; and to manage the access from the internal network to the virtual machine in the internal network; or to migrate the virtual machine from the internal network to the external network if the usage of the physical resource in the internal network exceed a predefined value; and to manage the access from the internal network to the virtual machine in the external network over the data connection.
  • the first management component comprises a first application programming interface
  • the second management component comprises a second application programming interface
  • the system further comprises a first and a second virtual private network router being located in the internal and the external network, respectively.
  • the data connection is preferably established between the first and the second virtual private network router.
  • the system is further adapted to manage the Quality of Service of the data connection using the first and/or the virtual private network router.
  • the internal network is an intranet connecting an internal data centre
  • the external network is a third party network connecting a third party data centre.
  • the internal and external cloud resources are separated and each user has their own technologies and administration interfaces.
  • the present invention enables that a user has one point for all cloud computing VM provisioning requests, internally and externally hosted. This is realised by the integration of internal and external resources using a combination of hybrid cloud management software and OSI layer 2 provider provisioned virtual private network, PPVPN.
  • the third party data centres are not integrated with a company's intranet.
  • the present invention provides the possibility that third party data centres can be integrated seamlessly in the existing network infrastructure and behave like internal data centres. This can be archived by using a single cloud management interface to manage internal and external resources and using OSI layer 2 PPVPN to maintain a homogenous IP network over all resources.
  • the present invention enables that the request for more VM resources than internally available can be fulfilled transparently to the user, as virtual machines can be provisioned in a third party data centre which is connected via an OSI layer 2 PPVPN.
  • OSI layer 2 PPVPN an OSI layer 2 PPVPN
  • the present invention may guarantee the QoS by managing both ends of the PPVPN connection. This can be realised by integration of QoS management of an PPVPN, e.g. MPLS, with resource management of the management component.
  • the virtual machine can automatically be provisioned in a data centre depending on requested resources and quality of service, thereby optimising resource allocation and costs. This can be achieved by managing of network QoS parameters from a central VM management component.
  • Fig. 1 shows a physical computer appliance comprising a management component being adapted to manage virtual machines from different data centres.
  • the system further comprises a component that establishes an OSI Layer 2 VPN to the third party provider.
  • the protocol for the connection may be MPLS.
  • Fig. 2 shows the connection between the internal network and the third party network.
  • the VPN router is able to manage the quality of service of the connection to the third party provider, e.g. bandwidth, delay, jitter and packet loss. Additional data centres in the intranet can be managed as well.
  • the appliance may contain additional components that provide CPU and storage and act as a data centre, see Fig. 1 . That data centre is also managed by the central management component.
  • API application program interface
  • the underlying network incl. its QoS parameters, is known. Also, bandwidth between these routers can be reserved for the packages. Moreover, QoS requirements may comprises round-trip time of a package and/or Jitter of the network connection.
  • the data centre management component provides an API to the central management component. It manages all physical resources within a data centre. It can assign resources to a VM and start and stop a VM.
  • an API enables the configuration of network path QoS parameters.
  • Such a network path determines the route through a network, e.g. the Internet, which is used to establish a VPN connection between two VPN routers. Usually, this is an MPLS path through the Internet.
  • the data centre management components and the VPN routers publish available resources and quality parameters to the central management component via the API. Thereby the central management component can provision VMs according to available and requested resources.
  • the method and the system according to the present invention may be set up as follows:
  • the physical computer appliance is setup in a way that the central management component manages the locally available resources and the VPN router, including the QoS parameters for a VPN connection.
  • Every data centre is equipped with a data centre management component.
  • Each of the systems is registered in the central management component so that the central management component can manage VMs in the data centre.
  • Every data centre that is integrated via VPN needs to setup a VPN router on their side.
  • the VPN router in the physical computer appliance and the VPN router in the data centre are set-up such that they can establish a VPN connection.
  • the VPN router is registered with the central management component.
  • the OSI Layer 2 VPN is established as follows: Within the internal network IP range of the intranet the computer appliance is placed in, a certain range is reserved for the appliance. Within the intranet, the IP range is routed to the computer appliance.
  • the management component then assigns IP addresses to VMs. Such a VM might be hosted in a third party data centre. In that case, the IP is automatically routed over the VPN to the remote data centre, where it is routed to the appropriate VM.
  • the usage scenario of the system and method according to the present invention may be shown exemplarily as follows: If a user wants to start a VM, he accesses the system via the Web site of the central management component. He then selects a VM appliance of his choice and configures it according to his requirements.
  • the requirements might include VM-specific resources such as RAM, virtual CPU, computing power, disk size and uptime and network path specific QoS requirements such as bandwidth, delay, jitter and packet loss. He then requests to start the VM.
  • the management component decides where to provision the VM. The decision can be based on the capability to fulfil the requirements and on the costs. E.g. if a low delay has been requested, the VM is provisioned in an internal data centre near to the user.
  • the management component might provision the VM in a third-party data centre. Due to the OSI layer 2 VPN, the location where the VM is running is transparent to the user. The management component informs the user about the IP address assigned to the VM. The user can then access the VM.
  • the user accesses the system via the Web site of the management component.
  • the management component he reconfigures the VM setting.
  • the management component checks if the QoS requirement can be met. Possibly, the VPN connection is reconfigured to enable the shorter packet roundtrip time.
  • the management component has to migrate the VM from a third party data centre to an internal data centre that is physically nearer to the user. The IP address of the VM then automatically gets rerouted to that data centre. After the migration, the user can access the VM as before, but with the shorter delay.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a method of providing access to a virtual machine distributed in a hybrid cloud network, wherein the hybrid cloud network comprises an internal network having a first management component and an external network having a second management component, wherein the internal and external network being connected through a data connection over the internet, wherein the method comprises steps of: a) tunnelling the data connection using an OSI layer 2 provider provisioned virtual private network; b) routing the access from the internal network to the virtual machine. The present invention also provides a system of providing access to a virtual machine distributed in a hybrid cloud network.

Description

    Technical Field
  • The present invention relates to a method and a system for hybrid cloud distributed virtual machine management services over a virtual private network.
  • Background of the invention
  • Most business functions in commerce and administration are supported by IT systems. These systems often are connected via an intranet that is internal to a company/government body. If the business functions are performed across several sites, these internal networks have to be inter-connected. This can be done either by using dedicated lines between the sites, or by tunnelling over an existing and possibly public network. Tunnelling involves adding an envelope to a data package that is treated separately. Thereby, the content can be encrypted and the package routed along a predetermined path in the network. For example, virtual private network technology can be used for tunnelling through the Internet. A virtual private network, i.e. a VPN is a computer network layered on top of an underlying computer network. The private nature of a VPN means that the data travelling over the VPN is not generally visible to, or is encapsulated from, the underlying network traffic. Similarly, the traffic within the VPN appears to the underlying network as just another traffic stream to be passed. A VPN connection can be envisioned as a "pipe within a pipe", with the outer pipe being the underlying network connection.
  • Network traffic is often managed on the Open System Interconnection Reference Model layer 3, abbreviated as OSI Reference Model layer 3 or OSI Model layer 3. The OSI Model is an abstract description for layered communications and computer network protocol design. It was developed as part of the Open Systems Interconnection initiative. In its most basic form, it divides network architecture into seven layers which, from top to bottom, are the Application, Presentation, Session, Transport, Network, Data Link, and Physical Layers. It is therefore often referred to as the OSI Seven Layer Model. For achieving transparent tunnelling from the OSI layer 3 perspective, i.e. network layer, a VPN has to be created on OSI layer 2, i.e. data link layer. Thereby, the tunnelling is transparent from the user perspective, as the same IP address space can be used. Common protocols are Multiprotocol Label Switching, MPLS and Layer 2 Tunnelling Protocol, L2TP.
  • MPLS is a mechanism in high-performance telecommunications networks which directs and carries data from one network node to the next. MPLS makes it easy to create "virtual links" between distant nodes. It can encapsulate packets of various network protocols. MPLS is a highly scalable, protocol agnostic, data-carrying mechanism. In an MPLS network, data packets are assigned labels. Packet-forwarding decisions are made solely on the contents of this label, without the need to examine the packet itself. This allows one to create end-to-end circuits across any type of transport medium, using any protocol. The primary benefit is to eliminate dependence on a particular Data Link Layer technology, such as ATM, frame relay, SONET or Ethernet, and eliminate the need for multiple Layer 2 networks to satisfy different types of traffic. L2TP is a tunnelling protocol used to support VPNs. It does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy. The entire L2TP packet, including payload and L2TP header, is sent within a UDP datagram. It is common to carry Point-to-Point Protocol (PPP) sessions within an L2TP tunnel. L2TP does not provide confidentiality or strong authentication by itself. IPsec is often used to secure L2TP packets by providing confidentiality, authentication and integrity. The combination of these two protocols is generally known as L2TP/IPsec.
  • To provide IT services, servers are used. For resource efficiency reasons, these servers can be virtualised. Virtualisation is based on a virtual machine monitor software component, which runs on the server hardware and virtualises physical resources, thereby offering guest system an environment that looks like a physical host from the guest systems point of view. It allows running multiple operating systems and their applications on the same physical server, on top of the virtual machine monitor. Each operating system and its applications are said to be running within a virtual machine, VM. Common technologies used as virtual machine monitors are Xen and VMware. If VMs are to be run internal to a company/government body, the hardware resources running the VMs have to be provided internally. Otherwise, VMs can be run by third parties and accessed over a public network, e.g. the Internet. To manage VMs from distributed data centres, internal and external to a company/government body, hybrid cloud management tools can be used. The management functionalities include an authentication and authorization system, the ability to create, start, stop and delete VMs as well as to migrate VMs from one data centre to another.
  • Creating a virtual machine involves generating an image of a hard disk that is bootable and configuring a virtual machine environment with parameters like vCPUs, RAM, network configuration and computing power. Starting a VM involves creating a virtual machine environment on the host system and booting an image in this environment. Stopping a VM involves shutting down a guest system running and destroying the virtual machine environment. Deleting a virtual machine involves deleting the disk image and the environment configuration. Migrating a VM involves copying a hard disk image and the environment configuration from one host system to another.
  • Additional management functionalities are the definition of service level agreements, SLA and the assignment of an SLA to a VM as well as billing functionalities. Thereby, the user can run a VM in any connected data centre and migrate between the centres. Such technology is available e.g. from Zimory GmbH, Eucalyptus Systems and the OpenNebula Project.
  • Cloud services are a service that is offered in a way that the used infrastructure is transparent to the user. For virtual machine management, this implies that the user is completely unaware of the underlying hardware infrastructure. This stands in contrast to conventional virtual machine management, where a virtual machine is explicitly provisioned on a specific physical host. Hybrid cloud services combine physical resources that are publicly available on the Internet with resources that are internal to a company / government body.
  • More and more companies/government bodies run the physical resources in their data centre in a virtualised way. Some data centres even abstract from the physical infrastructure. That means that for the user the physical resource used is transparent. However, all VMs still run on physical resources internal to a company. Therefore, if the physical resources are exhausted, no further VMs can be started. Companies/government bodies can also run and manage their VMs at a third-party data centre. If a secure connection is required, a Virtual Private Network (VPN) might be used. Such a service is available e.g. from Amazon with their Elastic Compute Cloud (EC2) and Virtual Private Cloud (VPC) offerings respectively. In this case, the connection between a company network and the remote VM is established over the Internet. No guarantee can be given about the QoS of the connection used, i.e. bandwidth, delay, jitter and packet loss.
  • US 2008/0201414 A1 relates to transferring a virtual machine from a remote server computer for local execution by a client computer. It concerns the transfer of a virtual machine to a client computer system and back to a server computer system.
  • EP 2 019 358 A1 relates a method and a system for the creation and deployment of a virtual machine appliance on virtualised servers. It describes a method and a system to efficiently create and deploy virtual machine appliances and includes a management portal being run on a management server. By using the method and system, speed and reliability of VM provisioning is improved.
  • EP 2 043 320 B1 relates to a method and a system for automatic and remote server provisioning using virtual machine appliances. It describes a method and a system for provisioning virtual machine appliances on remote systems. This is essential for hybrid cloud management, as VMs have to be deployed on distributed data centres.
  • US 2008/0222375 A1 describes a method and a system for quickly migrating a virtual machine appliance from one host to another. This is especially useful for fast VM migration between distributed data centres, as the time between stopping a machine and starting the migrated version can be minimised.
  • EP 1 962 192 A1 relates to a method and a system for transparent migration of virtual machine storage which is similar to US 2008/0222375 A1 .
  • JP 2009/064211 A1 describes a system that combines virtual machine technology with virtual private network. However, the focus of the patent is on reducing the load of an application system.
  • US 2007/0211739 A1 relates to a system and a method for automated access to data management servers. To achieve this, virtual machines are used to establish VPN connections.
  • It is currently not possible to connect internally and externally hosted resources for virtual machines and to seamlessly manage virtual machines on the data centres, migrate between them and in addition still guarantee quality of service, QoS. If virtual resources are distributed, currently the management of the resources is inefficient. Such management has to take into account the properties of the resources as well as the quality of service of the communication channel between a user and the resource, that is QoS for networks paths includes bandwidth, delay, jitter and packet loss. In a distributed environment, currently, the coordination of all these parameters has to be done manually, thereby increasing costs and setup time.
  • Summary of the invention
  • Therefore, there is a need for the user to be able to specify all properties concerning a virtual machine and the connection to the virtual machine. Moreover, a virtual machine should be provisioned automatically according to the requirements. In other word there is a need of providing the possibility to define required resources independently of the hardware infrastructure properties, including physical host machines and network connections. The resources may be moved between physical host machines in different data centres, internal and external to a company, as required, seamlessly and transparent to the user and thereby to reduce the cost.
  • The invention provides a system and method that offers a company/government body the possibility to manage, migrate and access VMs in their intranet from the appliance itself, from internal virtualised resources and from third party providers as if they would be hosted in the intranet. Thereby, via the third party provider, scalable CPU, RAM and storage resources can be provided transparently to the user, as if the resources were available on the intranet. By controlling both ends of an OSI Layer 2 VPN, network path QoS can be managed and guaranteed even for externally hosted resources.
  • These above objects may be obtained by the features of the independent claims.
  • The present invention discloses a method of providing access to a virtual machine distributed in a hybrid cloud network, wherein the hybrid cloud network comprises an internal network having a first management component and an external network having a second management component, wherein the internal and external network being connected through a data connection over the internet, wherein the method comprises the steps of: a) tunnelling the data connection using an OSI layer 2 provider provisioned virtual private network; b) routing the access from the internal network to the virtual machine.
  • According to a preferred embodiment of the present invention, the method may further comprise the step of: maintaining an address list comprising a plurality of network addresses reserved to the internal network and to the first and the second management component, by the first management component.
  • According to a preferred embodiment of the present invention, the step b) further may comprise the step of: assigning a network address to the virtual machine.
  • According to a preferred embodiment of the present invention, before the step b) the method may further comprise the step of: defining the location of the virtual machine according to network preference information. The network preference information may comprise e.g. information about usage of the physical resources in the internal and external network and/or Quality of Service requirements for the data connection for hosting the access of the virtual machine.
  • According to a preferred embodiment of the present invention, the step b) further may comprise the steps of: b1) migrating the virtual machine from the external network to the internal network if the Quality of Service requirements of the virtual machine exceeds that the data connection provides, and managing the access from the internal network to the virtual machine in the internal network; or b1) migrating the virtual machine from the internal network to the external network if the usage of the physical resource in the internal network exceed a predefined value, and managing the access from the internal network to the virtual machine in the external network over the data connection.
  • The first or the second management component may assign a particular internet protocol address, i.e. IP address to the virtual machine. This IP address may be maintained unchanged even if the location of the virtual machine has been changed, e.g. the virtual machine has been migrated from the internal network to the external network due to the high load of the computer appliances hosting the virtual machine in the internal network, or the virtual machine has been migrated from the external network to the internal network because the available bandwidth of the data connection can not fulfil the requirement of the access to the virtual machine as defined by a user or in a service preference parameter. In other word, the virtual machine may be dynamically distributed in the hybrid network - either in the internal network or in the external network, without the need of changing its IP address. The IP address of the virtual is therefore transparent to the end user. It may save reconfiguration of the application which accesses the virtual machine, or it may also save an update on the naming system such as DNS server which provides the IP address of the virtual machine to a client. This is one of the preferred advantages of using the layer 2 provider provisioned virtual private network according to the present invention.
  • According to a preferred embodiment of the present invention, the first management component comprises a first application programming interface, and the second management component comprises a second application programming interface.
  • According to a preferred embodiment of the present invention, a first and a second virtual private network router are located in the internal and the external network, respectively, and wherein the data connection is established between the first and the second virtual private network router.
  • According to a preferred embodiment of the present invention, the method may further comprise the steps of managing the Quality of Service of the data connection by the first and/or the virtual private network router.
  • According to a preferred embodiment of the present invention, the internal network is an intranet connecting an internal data centre, and the external network is a third party network connecting a third party data centre.
  • According to a preferred embodiment of the present invention, the data connection is tunnelled using Multiprotocol Label Switching and/or Layer 2 Tunnelling Protocol.
  • According to a further aspect, the present invention also discloses a system for providing an access from an intranet to a virtual machine distributed in a hybrid cloud network, wherein the system comprises: at least a management component and at least a computer appliance for hosting the virtual machine. The system is configured to be connectable to the intranet via a data connection over the internet. The data connection is tunnelled by using an OSI layer 2 provider provisioned virtual private network.
  • According to a preferred embodiment of the present invention, the system is adapted to define the location of the virtual machine according to network preference information. The network preference information may comprise e.g. information about usage of the physical resources in the intranet and the system and/or Quality of Service requirements for the data connection for hosting the access of the virtual machine.
  • According to a preferred embodiment of the present invention, the system is adapted to migrate the virtual machine from the system to the intranet if the Quality of Service requirements of the virtual machine exceeds that the data connection provides; and to manage the access from the intranet to the virtual machine in the intranet; or to migrate the virtual machine from the intranet to the system if the usage of the physical resource in the intranet exceed a predefined value; and to manage the access from the intranet to the virtual machine in the system over the data connection.
  • According to a further aspect, the present invention also discloses a system for providing an access to a virtual machine distributed in a hybrid cloud network, wherein the hybrid cloud network comprises an internal network and an external network, wherein the system comprises: a first and a second management component located in the internal and the external network, respectively; a data connection over the internet between the internal and external network. The system is adapted to route the access to the virtual machine and the data connection being an OSI layer 2 provider provisioned virtual private network connection.
  • According to a preferred embodiment of the present invention, the system is adapted to maintain an address list comprising a plurality of network addresses reserved to the internal network and to the first and the second management component, by the first management component. The system may be adapted to assign a network address to the virtual machine.
  • According to a preferred embodiment of the present invention, the system is adapted to define the location of the virtual machine according to network preference information. The network preference information comprises information about usage of the physical resources in the intranet and the system and/or Quality of Service requirements for the data connection for hosting the access of the virtual machine.
  • According to a preferred embodiment of the present invention, wherein the system is adapted to migrate the virtual machine from the external network to the internal network if the Quality of Service requirements of the virtual machine exceeds that the data connection provides; and to manage the access from the internal network to the virtual machine in the internal network; or to migrate the virtual machine from the internal network to the external network if the usage of the physical resource in the internal network exceed a predefined value; and to manage the access from the internal network to the virtual machine in the external network over the data connection.
  • According to a preferred embodiment of the present invention, the first management component comprises a first application programming interface, and the second management component comprises a second application programming interface.
  • According to a preferred embodiment of the present invention, the system further comprises a first and a second virtual private network router being located in the internal and the external network, respectively. The data connection is preferably established between the first and the second virtual private network router.
  • According to a preferred embodiment of the present invention, the system is further adapted to manage the Quality of Service of the data connection using the first and/or the virtual private network router.
  • According to a preferred embodiment of the present invention, the internal network is an intranet connecting an internal data centre, and the external network is a third party network connecting a third party data centre.
  • Several further preferred advantages and effects of the present invention in comparison with the state of the art may be summarised as the follows:
  • In the state of the art, the internal and external cloud resources are separated and each user has their own technologies and administration interfaces. The present invention enables that a user has one point for all cloud computing VM provisioning requests, internally and externally hosted. This is realised by the integration of internal and external resources using a combination of hybrid cloud management software and OSI layer 2 provider provisioned virtual private network, PPVPN.
  • In the state of the art, the third party data centres are not integrated with a company's intranet. The present invention provides the possibility that third party data centres can be integrated seamlessly in the existing network infrastructure and behave like internal data centres. This can be archived by using a single cloud management interface to manage internal and external resources and using OSI layer 2 PPVPN to maintain a homogenous IP network over all resources.
  • In the state of the art, if internal virtualised resources are exhausted, no more virtual machines can be provisioned. The present invention enables that the request for more VM resources than internally available can be fulfilled transparently to the user, as virtual machines can be provisioned in a third party data centre which is connected via an OSI layer 2 PPVPN. Thereby, from a single user's perspective, resources appear to be unlimited. This can be archived by using a single cloud management interface to manage internal and external resources and using OSI layer 2 PPVPN to maintain a homogenous IP network over all resources.
  • In the state of the art, the quality of service for third party data centres, e.g. bandwidth, delay, jitter and packet loss, cannot be guaranteed. The present invention may guarantee the QoS by managing both ends of the PPVPN connection. This can be realised by integration of QoS management of an PPVPN, e.g. MPLS, with resource management of the management component.
  • In the state of the art, the data centre best matching the requirement needs to be selected manually. According to the present invention, the virtual machine can automatically be provisioned in a data centre depending on requested resources and quality of service, thereby optimising resource allocation and costs. This can be achieved by managing of network QoS parameters from a central VM management component.
  • Brief description of the Figures
    • Fig. 1 shows a physical computer appliance comprising a VPN router, a management component and optionally CPU, RAM and storage.
    • Fig. 2 shows the network setup scenario according to the present invention, wherein the internal network is connected via VPN over the internet with the third party network, and wherein the internal network comprises the company intranet, internal data centre and a computer appliance as shown in Fig. 1.
    Detailed description of the invention
  • Hereinafter the present invention will be described in connection with the figures.
  • Fig. 1 shows a physical computer appliance comprising a management component being adapted to manage virtual machines from different data centres. According to the present invention, the system further comprises a component that establishes an OSI Layer 2 VPN to the third party provider. The protocol for the connection may be MPLS.
  • Fig. 2 shows the connection between the internal network and the third party network. The VPN router is able to manage the quality of service of the connection to the third party provider, e.g. bandwidth, delay, jitter and packet loss. Additional data centres in the intranet can be managed as well. The appliance may contain additional components that provide CPU and storage and act as a data centre, see Fig. 1. That data centre is also managed by the central management component.
  • The central management component knows the network address of all data centre management component APIs (API = application program interface). Via this API, it can copy VM images from and to these data centres. It can request a data centre to configure a VM with resources such as vCPUs, HDD, RAM, and to start and stop a VM. Also, the central management components knows the network address of the OSI Layer 2 VPN management component API. Via this API, it can configure network paths with certain QoS parameters. A network path determines the route packages take through a networks. E.g. for MPLS, packages are encapsulated in an MPLS package with a specific label. MPLS routers in the network are configured to route these packages to predetermined routers. Thereby, packages always take the same, predetermined route through the network. As the route is known, the underlying network, incl. its QoS parameters, is known. Also, bandwidth between these routers can be reserved for the packages. Moreover, QoS requirements may comprises round-trip time of a package and/or Jitter of the network connection.
  • The data centre management component provides an API to the central management component. It manages all physical resources within a data centre. It can assign resources to a VM and start and stop a VM. On the VPN router, an API enables the configuration of network path QoS parameters. Such a network path determines the route through a network, e.g. the Internet, which is used to establish a VPN connection between two VPN routers. Usually, this is an MPLS path through the Internet.
  • The data centre management components and the VPN routers publish available resources and quality parameters to the central management component via the API. Thereby the central management component can provision VMs according to available and requested resources.
  • The method and the system according to the present invention may be set up as follows: The physical computer appliance is setup in a way that the central management component manages the locally available resources and the VPN router, including the QoS parameters for a VPN connection. Every data centre is equipped with a data centre management component. Each of the systems is registered in the central management component so that the central management component can manage VMs in the data centre.
  • Also, every data centre that is integrated via VPN needs to setup a VPN router on their side. The VPN router in the physical computer appliance and the VPN router in the data centre are set-up such that they can establish a VPN connection. The VPN router is registered with the central management component. The OSI Layer 2 VPN is established as follows: Within the internal network IP range of the intranet the computer appliance is placed in, a certain range is reserved for the appliance. Within the intranet, the IP range is routed to the computer appliance. The management component then assigns IP addresses to VMs. Such a VM might be hosted in a third party data centre. In that case, the IP is automatically routed over the VPN to the remote data centre, where it is routed to the appropriate VM.
  • The usage scenario of the system and method according to the present invention may be shown exemplarily as follows: If a user wants to start a VM, he accesses the system via the Web site of the central management component. He then selects a VM appliance of his choice and configures it according to his requirements. The requirements might include VM-specific resources such as RAM, virtual CPU, computing power, disk size and uptime and network path specific QoS requirements such as bandwidth, delay, jitter and packet loss. He then requests to start the VM. The management component decides where to provision the VM. The decision can be based on the capability to fulfil the requirements and on the costs. E.g. if a low delay has been requested, the VM is provisioned in an internal data centre near to the user. If the physical resources of the internal data centre are exhausted, e.g. no more computing power or RAM is available, the management component might provision the VM in a third-party data centre. Due to the OSI layer 2 VPN, the location where the VM is running is transparent to the user. The management component informs the user about the IP address assigned to the VM. The user can then access the VM.
  • If the user requires one of his VMs to have a shorter delay, he accesses the system via the Web site of the management component. In the management component, he reconfigures the VM setting. The management component then checks if the QoS requirement can be met. Possibly, the VPN connection is reconfigured to enable the shorter packet roundtrip time. Possibly, the management component has to migrate the VM from a third party data centre to an internal data centre that is physically nearer to the user. The IP address of the VM then automatically gets rerouted to that data centre. After the migration, the user can access the VM as before, but with the shorter delay.
  • The present invention has now been described with reference to several embodiments thereof. The foregoing detailed description and examples have been given for clarity of understanding only. No unnecessary limitations are to be understood therefrom. It will be apparent to those skilled in the art that many changes can be made in the embodiments described without departing from scope of the present invention. In particular, although features and elements of the present invention are described in the preferred embodiments in particular combinations, each feature or element can be used alone without the other features and elements of the preferred embodiments or in various combinations with or without other features and elements of the invention. Therefore, the scope of the present invention should not be limited to the methods and systems described herein, but only by the language of the claims and the equivalents of those methods and systems.

Claims (20)

  1. Method of providing access to a virtual machine distributed in a hybrid cloud network, wherein the hybrid cloud network comprises an internal network having a first management component and an external network having a second management component, wherein the internal and external network being connected through a data connection over the internet, wherein the method comprises the steps of:
    a) tunnelling the data connection using an OSI layer 2 provider provisioned virtual private network;
    b) routing the access from the internal network to the virtual machine.
  2. Method according to claim 1,
    wherein the method further comprises step of: maintaining an address list comprising a plurality of network addresses reserved to the internal network and to the first and the second management component, by the first management component;
    wherein the step b) further comprises the step of: assigning a network address to the virtual machine.
  3. Method according to claims 1 or 2, wherein before the step b) the method further comprises the step of: defining the location of the virtual machine according to network preference information;
    wherein the network preference information comprises information about usage of the physical resources in the internal and external network and/or Quality of Service requirements for the data connection for hosting the access of the virtual machine.
  4. Method according to claim 3, wherein the step b) further comprises the steps of:
    b1) migrating the virtual machine from the external network to the internal network if the Quality of Service requirements of the virtual machine exceeds that the data connection provides, and managing the access from the internal network to the virtual machine in the internal network; or
    b1) migrating the virtual machine from the internal network to the external network if the usage of the physical resource in the internal network exceed a predefined value, and managing the access from the internal network to the virtual machine in the external network over the data connection.
  5. Method according to any one of the preceding claims, wherein the first management component comprises a first application programming interface, and the second management component comprises a second application programming interface.
  6. Method according to any one of the preceding claims, wherein a first and a second virtual private network router are located in the internal and the external network, respectively, and wherein the data connection is established between the first and the second virtual private network router.
  7. Method according to any one of the preceding claims, wherein the method further comprises the steps of managing the Quality of Service of the data connection by the first and/or the virtual private network router.
  8. Method according to any one of the preceding claims, wherein the internal network is an intranet connecting an internal data centre, and the external network is a third party network connecting a third party data centre.
  9. Method according to any one of the preceding claims, wherein the data connection is tunnelled using Multiprotocol Label Switching and/or Layer 2 Tunnelling Protocol.
  10. System for providing an access from an intranet to a virtual machine distributed in a hybrid cloud network, wherein the system comprises:
    at least a management component;
    a computer appliance for hosting the virtual machine;
    wherein the system is configured to be connectable to the intranet via a data connection over the internet; and wherein the data connection is tunnelled by using an OSI layer 2 provider provisioned virtual private network.
  11. System according to claim 10, wherein the system is adapted to define the location of the virtual machine according to network preference information;
    wherein the network preference information comprises information about usage of the physical resources in the intranet and the system and/or Quality of Service requirements for the data connection for hosting the access of the virtual machine.
  12. System according to claim 11,
    wherein the system is adapted to migrate the virtual machine from the system to the intranet if the Quality of Service requirements of the virtual machine exceeds that the data connection provides; and to manage the access from the intranet to the virtual machine in the intranet; or
    wherein the system is adapted to migrate the virtual machine from the intranet to the system if the usage of the physical resource in the intranet exceed a predefined value; and to manage the access from the intranet to the virtual machine in the system over the data connection.
  13. System for providing an access to a virtual machine distributed in a hybrid cloud network, wherein the hybrid cloud network comprises an internal network and an external network, wherein the system comprises:
    a first and a second management component located in the internal and the external network, respectively;
    a data connection over the internet between the internal and external network;
    wherein the system being adapted to route the access to the virtual machine; and wherein the data connection being an OSI layer 2 provider provisioned virtual private network connection.
  14. System according to claim 13,
    wherein the system is adapted to maintain an address list comprising a plurality of network addresses reserved to the internal network and to the first and the second management component, by the first management component;
    wherein the system is adapted to assign a network address to the virtual machine.
  15. System according to claims 13 or 14, wherein the system is adapted to define the location of the virtual machine according to network preference information;
    wherein the network preference information comprises information about usage of the physical resources in the intranet and the system and/or Quality of Service requirements for the data connection for hosting the access of the virtual machine.
  16. System according to claim 15, wherein the system is adapted to:
    migrate the virtual machine from the external network to the internal network if the Quality of Service requirements of the virtual machine exceeds that the data connection provides; and to manage the access from the internal network to the virtual machine in the internal network; or
    migrate the virtual machine from the internal network to the external network if the usage of the physical resource in the internal network exceed a predefined value; and to manage the access from the internal network to the virtual machine in the external network over the data connection.
  17. System according to any one of claims 13-16, wherein the first management component comprises a first application programming interface, and the second management component comprises a second application programming interface.
  18. System according to any one of claims 13-17, wherein the system further comprises a first and a second virtual private network router being located in the internal and the external network, respectively; and wherein the data connection is established between the first and the second virtual private network router.
  19. System according to any one of claims 13-18, wherein the system is further adapted to manage the Quality of Service of the data connection using the first and/or the virtual private network router.
  20. System according to any one of claims 13-19, wherein the internal network is an intranet connecting an internal data centre, and the external network is a third party network connecting a third party data centre.
EP10186913A 2010-10-07 2010-10-07 Method and system of providing access to a virtual machine distributed in a hybrid cloud network Ceased EP2439637A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP10186913A EP2439637A1 (en) 2010-10-07 2010-10-07 Method and system of providing access to a virtual machine distributed in a hybrid cloud network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP10186913A EP2439637A1 (en) 2010-10-07 2010-10-07 Method and system of providing access to a virtual machine distributed in a hybrid cloud network

Publications (1)

Publication Number Publication Date
EP2439637A1 true EP2439637A1 (en) 2012-04-11

Family

ID=43567957

Family Applications (1)

Application Number Title Priority Date Filing Date
EP10186913A Ceased EP2439637A1 (en) 2010-10-07 2010-10-07 Method and system of providing access to a virtual machine distributed in a hybrid cloud network

Country Status (1)

Country Link
EP (1) EP2439637A1 (en)

Cited By (83)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103378983A (en) * 2012-04-20 2013-10-30 国家电网公司 Intranet patch distributing system
WO2013163216A1 (en) * 2012-04-24 2013-10-31 Cisco Technology, Inc. Distributed virtual switch architecture for a hybrid cloud
WO2014021849A1 (en) * 2012-07-31 2014-02-06 Hewlett-Packard Development Company, L.P. Orchestrating hybrid cloud services
CN104063267A (en) * 2014-07-11 2014-09-24 孙强强 Method and system for monitoring flow of virtual machine
US9201704B2 (en) 2012-04-05 2015-12-01 Cisco Technology, Inc. System and method for migrating application virtual machines in a network environment
US9223634B2 (en) 2012-05-02 2015-12-29 Cisco Technology, Inc. System and method for simulating virtual machine migration in a network environment
EP2680143A3 (en) * 2012-06-29 2016-06-01 Pulse Secure, LLC Migrating Virtual Machines Between Computing Devices
EP2923320A4 (en) * 2012-11-26 2016-07-20 Cycle Computing Llc Transparently routing job submissions between disparate environments
US9851999B2 (en) 2015-07-30 2017-12-26 At&T Intellectual Property I, L.P. Methods, systems, and computer readable storage devices for handling virtualization of a physical telephone number mapping service
US9866521B2 (en) 2015-07-30 2018-01-09 At&T Intellectual Property L.L.P. Methods, systems, and computer readable storage devices for determining whether to forward requests from a physical telephone number mapping service server to a virtual telephone number mapping service server
US9888127B2 (en) 2015-07-30 2018-02-06 At&T Intellectual Property I, L.P. Methods, systems, and computer readable storage devices for adjusting the use of virtual resources providing communication services based on load
US9935894B2 (en) 2014-05-08 2018-04-03 Cisco Technology, Inc. Collaborative inter-service scheduling of logical resources in cloud platforms
US10034201B2 (en) 2015-07-09 2018-07-24 Cisco Technology, Inc. Stateless load-balancing across multiple tunnels
US10037617B2 (en) 2015-02-27 2018-07-31 Cisco Technology, Inc. Enhanced user interface systems including dynamic context selection for cloud-based networks
US10050862B2 (en) 2015-02-09 2018-08-14 Cisco Technology, Inc. Distributed application framework that uses network and application awareness for placing data
US10067780B2 (en) 2015-10-06 2018-09-04 Cisco Technology, Inc. Performance-based public cloud selection for a hybrid cloud environment
US10084703B2 (en) 2015-12-04 2018-09-25 Cisco Technology, Inc. Infrastructure-exclusive service forwarding
US10122605B2 (en) 2014-07-09 2018-11-06 Cisco Technology, Inc Annotation of network activity through different phases of execution
US10129177B2 (en) 2016-05-23 2018-11-13 Cisco Technology, Inc. Inter-cloud broker for hybrid cloud networks
US10140172B2 (en) 2016-05-18 2018-11-27 Cisco Technology, Inc. Network-aware storage repairs
US10142346B2 (en) 2016-07-28 2018-11-27 Cisco Technology, Inc. Extension of a private cloud end-point group to a public cloud
US10205677B2 (en) 2015-11-24 2019-02-12 Cisco Technology, Inc. Cloud resource placement optimization and migration execution in federated clouds
US10212074B2 (en) 2011-06-24 2019-02-19 Cisco Technology, Inc. Level of hierarchy in MST for traffic localization and load balancing
CN109426549A (en) * 2017-09-01 2019-03-05 英特尔公司 Distribution is interconnected for the accelerator of virtual environment
US10222986B2 (en) 2015-05-15 2019-03-05 Cisco Technology, Inc. Tenant-level sharding of disks with tenant-specific storage modules to enable policies per tenant in a distributed storage system
US10243826B2 (en) 2015-01-10 2019-03-26 Cisco Technology, Inc. Diagnosis and throughput measurement of fibre channel ports in a storage area network environment
US10243823B1 (en) 2017-02-24 2019-03-26 Cisco Technology, Inc. Techniques for using frame deep loopback capabilities for extended link diagnostics in fibre channel storage area networks
US10257042B2 (en) 2012-01-13 2019-04-09 Cisco Technology, Inc. System and method for managing site-to-site VPNs of a cloud managed network
US10254991B2 (en) 2017-03-06 2019-04-09 Cisco Technology, Inc. Storage area network based extended I/O metrics computation for deep insight into application performance
US10263898B2 (en) 2016-07-20 2019-04-16 Cisco Technology, Inc. System and method for implementing universal cloud classification (UCC) as a service (UCCaaS)
US10277736B2 (en) 2015-07-30 2019-04-30 At&T Intellectual Property I, L.P. Methods, systems, and computer readable storage devices for determining whether to handle a request for communication services by a physical telephone number mapping service or a virtual telephone number mapping service
US10303534B2 (en) 2017-07-20 2019-05-28 Cisco Technology, Inc. System and method for self-healing of application centric infrastructure fabric memory
US10320683B2 (en) 2017-01-30 2019-06-11 Cisco Technology, Inc. Reliable load-balancer using segment routing and real-time application monitoring
US10326817B2 (en) 2016-12-20 2019-06-18 Cisco Technology, Inc. System and method for quality-aware recording in large scale collaborate clouds
US10334029B2 (en) 2017-01-10 2019-06-25 Cisco Technology, Inc. Forming neighborhood groups from disperse cloud providers
US10353800B2 (en) 2017-10-18 2019-07-16 Cisco Technology, Inc. System and method for graph based monitoring and management of distributed systems
US10367914B2 (en) 2016-01-12 2019-07-30 Cisco Technology, Inc. Attaching service level agreements to application containers and enabling service assurance
US10382597B2 (en) 2016-07-20 2019-08-13 Cisco Technology, Inc. System and method for transport-layer level identification and isolation of container traffic
US10382274B2 (en) 2017-06-26 2019-08-13 Cisco Technology, Inc. System and method for wide area zero-configuration network auto configuration
US10382534B1 (en) 2015-04-04 2019-08-13 Cisco Technology, Inc. Selective load balancing of network traffic
US10404596B2 (en) 2017-10-03 2019-09-03 Cisco Technology, Inc. Dynamic route profile storage in a hardware trie routing table
US10425288B2 (en) 2017-07-21 2019-09-24 Cisco Technology, Inc. Container telemetry in data center environments with blade servers and switches
US10432532B2 (en) 2016-07-12 2019-10-01 Cisco Technology, Inc. Dynamically pinning micro-service to uplink port
US10439877B2 (en) 2017-06-26 2019-10-08 Cisco Technology, Inc. Systems and methods for enabling wide area multicast domain name system
US10454984B2 (en) 2013-03-14 2019-10-22 Cisco Technology, Inc. Method for streaming packet captures from network access devices to a cloud server over HTTP
US10462136B2 (en) 2015-10-13 2019-10-29 Cisco Technology, Inc. Hybrid cloud security groups
US10461959B2 (en) 2014-04-15 2019-10-29 Cisco Technology, Inc. Programmable infrastructure gateway for enabling hybrid cloud services in a network environment
US10476982B2 (en) 2015-05-15 2019-11-12 Cisco Technology, Inc. Multi-datacenter message queue
US10511534B2 (en) 2018-04-06 2019-12-17 Cisco Technology, Inc. Stateless distributed load-balancing
US10523657B2 (en) 2015-11-16 2019-12-31 Cisco Technology, Inc. Endpoint privacy preservation with cloud conferencing
US10523592B2 (en) 2016-10-10 2019-12-31 Cisco Technology, Inc. Orchestration system for migrating user data and services based on user information
US10541866B2 (en) 2017-07-25 2020-01-21 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
US10545914B2 (en) 2017-01-17 2020-01-28 Cisco Technology, Inc. Distributed object storage
US10552191B2 (en) 2017-01-26 2020-02-04 Cisco Technology, Inc. Distributed hybrid cloud orchestration model
US10567344B2 (en) 2016-08-23 2020-02-18 Cisco Technology, Inc. Automatic firewall configuration based on aggregated cloud managed information
US10585830B2 (en) 2015-12-10 2020-03-10 Cisco Technology, Inc. Policy-driven storage in a microserver computing environment
US10601693B2 (en) 2017-07-24 2020-03-24 Cisco Technology, Inc. System and method for providing scalable flow monitoring in a data center fabric
US10608865B2 (en) 2016-07-08 2020-03-31 Cisco Technology, Inc. Reducing ARP/ND flooding in cloud environment
US10623374B2 (en) 2017-06-09 2020-04-14 Microsoft Technology Licensing, Llc Automatic network identification for enhanced communications administration
US10664169B2 (en) 2016-06-24 2020-05-26 Cisco Technology, Inc. Performance of object storage system by reconfiguring storage devices based on latency that includes identifying a number of fragments that has a particular storage device as its primary storage device and another number of fragments that has said particular storage device as its replica storage device
US10671571B2 (en) 2017-01-31 2020-06-02 Cisco Technology, Inc. Fast network performance in containerized environments for network function virtualization
US10708342B2 (en) 2015-02-27 2020-07-07 Cisco Technology, Inc. Dynamic troubleshooting workspaces for cloud and network management systems
US10705882B2 (en) 2017-12-21 2020-07-07 Cisco Technology, Inc. System and method for resource placement across clouds for data intensive workloads
US10728361B2 (en) 2018-05-29 2020-07-28 Cisco Technology, Inc. System for association of customer information across subscribers
US10764266B2 (en) 2018-06-19 2020-09-01 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US10778765B2 (en) 2015-07-15 2020-09-15 Cisco Technology, Inc. Bid/ask protocol in scale-out NVMe storage
US10805235B2 (en) 2014-09-26 2020-10-13 Cisco Technology, Inc. Distributed application framework for prioritizing network traffic using application priority awareness
US10819571B2 (en) 2018-06-29 2020-10-27 Cisco Technology, Inc. Network traffic optimization using in-situ notification system
US10826829B2 (en) 2015-03-26 2020-11-03 Cisco Technology, Inc. Scalable handling of BGP route information in VXLAN with EVPN control plane
US10872056B2 (en) 2016-06-06 2020-12-22 Cisco Technology, Inc. Remote memory access using memory mapped addressing among multiple compute nodes
US10892940B2 (en) 2017-07-21 2021-01-12 Cisco Technology, Inc. Scalable statistics and analytics mechanisms in cloud networking
US10904342B2 (en) 2018-07-30 2021-01-26 Cisco Technology, Inc. Container networking using communication tunnels
US10904322B2 (en) 2018-06-15 2021-01-26 Cisco Technology, Inc. Systems and methods for scaling down cloud-based servers handling secure connections
US10942666B2 (en) 2017-10-13 2021-03-09 Cisco Technology, Inc. Using network device replication in distributed storage clusters
US11005682B2 (en) 2015-10-06 2021-05-11 Cisco Technology, Inc. Policy-driven switch overlay bypass in a hybrid cloud network environment
US11005731B2 (en) 2017-04-05 2021-05-11 Cisco Technology, Inc. Estimating model parameters for automatic deployment of scalable micro services
US11019083B2 (en) 2018-06-20 2021-05-25 Cisco Technology, Inc. System for coordinating distributed website analysis
US11044162B2 (en) 2016-12-06 2021-06-22 Cisco Technology, Inc. Orchestration of cloud and fog interactions
US11481362B2 (en) 2017-11-13 2022-10-25 Cisco Technology, Inc. Using persistent memory to enable restartability of bulk load transactions in cloud databases
US11563695B2 (en) 2016-08-29 2023-01-24 Cisco Technology, Inc. Queue protection using a shared global memory reserve
US11588783B2 (en) 2015-06-10 2023-02-21 Cisco Technology, Inc. Techniques for implementing IPV6-based distributed storage space
US11595474B2 (en) 2017-12-28 2023-02-28 Cisco Technology, Inc. Accelerating data replication using multicast and non-volatile memory enabled nodes
CN119583366A (en) * 2025-01-24 2025-03-07 南京赛宁信息技术有限公司 A method and system for simulating VPN access in a network range

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070211739A1 (en) 2006-03-10 2007-09-13 Brian Schrock System and method for automated access of a data management server through a virtual private network
US20080201414A1 (en) 2007-02-15 2008-08-21 Amir Husain Syed M Transferring a Virtual Machine from a Remote Server Computer for Local Execution by a Client Computer
EP1962192A1 (en) 2007-02-21 2008-08-27 Deutsche Telekom AG Method and system for the transparent migration of virtual machine storage
EP2019358A1 (en) 2007-07-25 2009-01-28 Deutsche Telekom AG A method and a system for the creation and deployment of a virtual machine appliance on virtualised servers
JP2009064211A (en) 2007-09-06 2009-03-26 Nec Corp Distributed system
EP2043320B1 (en) 2007-09-28 2009-12-09 Zimory GmbH Method and system for automatic and remote server provisioning using virtual machine appliances

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070211739A1 (en) 2006-03-10 2007-09-13 Brian Schrock System and method for automated access of a data management server through a virtual private network
US20080201414A1 (en) 2007-02-15 2008-08-21 Amir Husain Syed M Transferring a Virtual Machine from a Remote Server Computer for Local Execution by a Client Computer
EP1962192A1 (en) 2007-02-21 2008-08-27 Deutsche Telekom AG Method and system for the transparent migration of virtual machine storage
US20080222375A1 (en) 2007-02-21 2008-09-11 Deutsche Telekom Ag Method and system for the transparent migration of virtual machines storage
EP2019358A1 (en) 2007-07-25 2009-01-28 Deutsche Telekom AG A method and a system for the creation and deployment of a virtual machine appliance on virtualised servers
JP2009064211A (en) 2007-09-06 2009-03-26 Nec Corp Distributed system
EP2043320B1 (en) 2007-09-28 2009-12-09 Zimory GmbH Method and system for automatic and remote server provisioning using virtual machine appliances

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
CISCO: "Data Center Interconnect: Layer 2 Extension Between Remote Data Centers - White Paper", 17 May 2010 (2010-05-17), pages 1 - 29, XP002623552, Retrieved from the Internet <URL:http://www.cisco.com/en/US/prod/collateral/switches/ps5718/ps708/white_paper_c11_493718.pdf> [retrieved on 20110217] *
JACOBUS VAN DER MERWE ET AL: "Towards a ubiquitous cloud computing infrastructure", LOCAL AND METROPOLITAN AREA NETWORKS (LANMAN), 2010 17TH IEEE WORKSHOP ON, IEEE, PISCATAWAY, NJ, USA, 5 May 2010 (2010-05-05), pages 1 - 6, XP031706932, ISBN: 978-1-4244-6067-0 *
RAJKUMAR BUYYA ET AL: "InterCloud: Utility-Oriented Federation of Cloud Computing Environments for Scaling of Application Services", 21 May 2010, ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, SPRINGER BERLIN HEIDELBERG, BERLIN, HEIDELBERG, PAGE(S) 13 - 31, ISBN: 978-3-642-13118-9, XP019142352 *
RODERO-MERINO L ET AL: "From infrastructure delivery to service management in clouds", FUTURE GENERATIONS COMPUTER SYSTEMS, ELSEVIER SCIENCE PUBLISHERS. AMSTERDAM, NL, vol. 26, no. 8, 1 October 2010 (2010-10-01), pages 1226 - 1240, XP027196259, ISSN: 0167-739X, [retrieved on 20100306] *

Cited By (124)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10212074B2 (en) 2011-06-24 2019-02-19 Cisco Technology, Inc. Level of hierarchy in MST for traffic localization and load balancing
US10257042B2 (en) 2012-01-13 2019-04-09 Cisco Technology, Inc. System and method for managing site-to-site VPNs of a cloud managed network
US9201704B2 (en) 2012-04-05 2015-12-01 Cisco Technology, Inc. System and method for migrating application virtual machines in a network environment
CN103378983A (en) * 2012-04-20 2013-10-30 国家电网公司 Intranet patch distributing system
WO2013163216A1 (en) * 2012-04-24 2013-10-31 Cisco Technology, Inc. Distributed virtual switch architecture for a hybrid cloud
US9203784B2 (en) 2012-04-24 2015-12-01 Cisco Technology, Inc. Distributed virtual switch architecture for a hybrid cloud
US9223634B2 (en) 2012-05-02 2015-12-29 Cisco Technology, Inc. System and method for simulating virtual machine migration in a network environment
EP2680143A3 (en) * 2012-06-29 2016-06-01 Pulse Secure, LLC Migrating Virtual Machines Between Computing Devices
US9882829B2 (en) 2012-07-31 2018-01-30 Hewlett Packard Enterprise Development Lp Orchestrating hybrid cloud services
WO2014021849A1 (en) * 2012-07-31 2014-02-06 Hewlett-Packard Development Company, L.P. Orchestrating hybrid cloud services
EP2923320A4 (en) * 2012-11-26 2016-07-20 Cycle Computing Llc Transparently routing job submissions between disparate environments
US10454984B2 (en) 2013-03-14 2019-10-22 Cisco Technology, Inc. Method for streaming packet captures from network access devices to a cloud server over HTTP
US10972312B2 (en) 2014-04-15 2021-04-06 Cisco Technology, Inc. Programmable infrastructure gateway for enabling hybrid cloud services in a network environment
US10461959B2 (en) 2014-04-15 2019-10-29 Cisco Technology, Inc. Programmable infrastructure gateway for enabling hybrid cloud services in a network environment
US11606226B2 (en) 2014-04-15 2023-03-14 Cisco Technology, Inc. Programmable infrastructure gateway for enabling hybrid cloud services in a network environment
US9935894B2 (en) 2014-05-08 2018-04-03 Cisco Technology, Inc. Collaborative inter-service scheduling of logical resources in cloud platforms
US10122605B2 (en) 2014-07-09 2018-11-06 Cisco Technology, Inc Annotation of network activity through different phases of execution
CN104063267A (en) * 2014-07-11 2014-09-24 孙强强 Method and system for monitoring flow of virtual machine
CN104063267B (en) * 2014-07-11 2017-11-14 孙强强 A kind of virtual machine traffic monitoring method and system
US10805235B2 (en) 2014-09-26 2020-10-13 Cisco Technology, Inc. Distributed application framework for prioritizing network traffic using application priority awareness
US10243826B2 (en) 2015-01-10 2019-03-26 Cisco Technology, Inc. Diagnosis and throughput measurement of fibre channel ports in a storage area network environment
US10050862B2 (en) 2015-02-09 2018-08-14 Cisco Technology, Inc. Distributed application framework that uses network and application awareness for placing data
US10037617B2 (en) 2015-02-27 2018-07-31 Cisco Technology, Inc. Enhanced user interface systems including dynamic context selection for cloud-based networks
US10708342B2 (en) 2015-02-27 2020-07-07 Cisco Technology, Inc. Dynamic troubleshooting workspaces for cloud and network management systems
US10825212B2 (en) 2015-02-27 2020-11-03 Cisco Technology, Inc. Enhanced user interface systems including dynamic context selection for cloud-based networks
US10826829B2 (en) 2015-03-26 2020-11-03 Cisco Technology, Inc. Scalable handling of BGP route information in VXLAN with EVPN control plane
US10382534B1 (en) 2015-04-04 2019-08-13 Cisco Technology, Inc. Selective load balancing of network traffic
US11122114B2 (en) 2015-04-04 2021-09-14 Cisco Technology, Inc. Selective load balancing of network traffic
US11843658B2 (en) 2015-04-04 2023-12-12 Cisco Technology, Inc. Selective load balancing of network traffic
US10222986B2 (en) 2015-05-15 2019-03-05 Cisco Technology, Inc. Tenant-level sharding of disks with tenant-specific storage modules to enable policies per tenant in a distributed storage system
US11354039B2 (en) 2015-05-15 2022-06-07 Cisco Technology, Inc. Tenant-level sharding of disks with tenant-specific storage modules to enable policies per tenant in a distributed storage system
US10671289B2 (en) 2015-05-15 2020-06-02 Cisco Technology, Inc. Tenant-level sharding of disks with tenant-specific storage modules to enable policies per tenant in a distributed storage system
US10938937B2 (en) 2015-05-15 2021-03-02 Cisco Technology, Inc. Multi-datacenter message queue
US10476982B2 (en) 2015-05-15 2019-11-12 Cisco Technology, Inc. Multi-datacenter message queue
US11588783B2 (en) 2015-06-10 2023-02-21 Cisco Technology, Inc. Techniques for implementing IPV6-based distributed storage space
US10034201B2 (en) 2015-07-09 2018-07-24 Cisco Technology, Inc. Stateless load-balancing across multiple tunnels
US10778765B2 (en) 2015-07-15 2020-09-15 Cisco Technology, Inc. Bid/ask protocol in scale-out NVMe storage
US10498884B2 (en) 2015-07-30 2019-12-03 At&T Intellectual Property I, L.P. Methods, systems, and computer readable storage devices for determining whether to handle a request for communication services by a physical telephone number mapping service or a virtual telephone number mapping service
US9888127B2 (en) 2015-07-30 2018-02-06 At&T Intellectual Property I, L.P. Methods, systems, and computer readable storage devices for adjusting the use of virtual resources providing communication services based on load
US9851999B2 (en) 2015-07-30 2017-12-26 At&T Intellectual Property I, L.P. Methods, systems, and computer readable storage devices for handling virtualization of a physical telephone number mapping service
US10523822B2 (en) 2015-07-30 2019-12-31 At&T Intellectual Property I, L.P. Methods, systems, and computer readable storage devices for adjusting the use of virtual resources providing communication services based on load
US9866521B2 (en) 2015-07-30 2018-01-09 At&T Intellectual Property L.L.P. Methods, systems, and computer readable storage devices for determining whether to forward requests from a physical telephone number mapping service server to a virtual telephone number mapping service server
US10277736B2 (en) 2015-07-30 2019-04-30 At&T Intellectual Property I, L.P. Methods, systems, and computer readable storage devices for determining whether to handle a request for communication services by a physical telephone number mapping service or a virtual telephone number mapping service
US10901769B2 (en) 2015-10-06 2021-01-26 Cisco Technology, Inc. Performance-based public cloud selection for a hybrid cloud environment
US10067780B2 (en) 2015-10-06 2018-09-04 Cisco Technology, Inc. Performance-based public cloud selection for a hybrid cloud environment
US11005682B2 (en) 2015-10-06 2021-05-11 Cisco Technology, Inc. Policy-driven switch overlay bypass in a hybrid cloud network environment
US10462136B2 (en) 2015-10-13 2019-10-29 Cisco Technology, Inc. Hybrid cloud security groups
US11218483B2 (en) 2015-10-13 2022-01-04 Cisco Technology, Inc. Hybrid cloud security groups
US12363115B2 (en) 2015-10-13 2025-07-15 Cisco Technology, Inc. Hybrid cloud security groups
US10523657B2 (en) 2015-11-16 2019-12-31 Cisco Technology, Inc. Endpoint privacy preservation with cloud conferencing
US10205677B2 (en) 2015-11-24 2019-02-12 Cisco Technology, Inc. Cloud resource placement optimization and migration execution in federated clouds
US10084703B2 (en) 2015-12-04 2018-09-25 Cisco Technology, Inc. Infrastructure-exclusive service forwarding
US10949370B2 (en) 2015-12-10 2021-03-16 Cisco Technology, Inc. Policy-driven storage in a microserver computing environment
US10585830B2 (en) 2015-12-10 2020-03-10 Cisco Technology, Inc. Policy-driven storage in a microserver computing environment
US10999406B2 (en) 2016-01-12 2021-05-04 Cisco Technology, Inc. Attaching service level agreements to application containers and enabling service assurance
US10367914B2 (en) 2016-01-12 2019-07-30 Cisco Technology, Inc. Attaching service level agreements to application containers and enabling service assurance
US10140172B2 (en) 2016-05-18 2018-11-27 Cisco Technology, Inc. Network-aware storage repairs
US10129177B2 (en) 2016-05-23 2018-11-13 Cisco Technology, Inc. Inter-cloud broker for hybrid cloud networks
US10872056B2 (en) 2016-06-06 2020-12-22 Cisco Technology, Inc. Remote memory access using memory mapped addressing among multiple compute nodes
US10664169B2 (en) 2016-06-24 2020-05-26 Cisco Technology, Inc. Performance of object storage system by reconfiguring storage devices based on latency that includes identifying a number of fragments that has a particular storage device as its primary storage device and another number of fragments that has said particular storage device as its replica storage device
US10659283B2 (en) 2016-07-08 2020-05-19 Cisco Technology, Inc. Reducing ARP/ND flooding in cloud environment
US10608865B2 (en) 2016-07-08 2020-03-31 Cisco Technology, Inc. Reducing ARP/ND flooding in cloud environment
US10432532B2 (en) 2016-07-12 2019-10-01 Cisco Technology, Inc. Dynamically pinning micro-service to uplink port
US10263898B2 (en) 2016-07-20 2019-04-16 Cisco Technology, Inc. System and method for implementing universal cloud classification (UCC) as a service (UCCaaS)
US10382597B2 (en) 2016-07-20 2019-08-13 Cisco Technology, Inc. System and method for transport-layer level identification and isolation of container traffic
US10142346B2 (en) 2016-07-28 2018-11-27 Cisco Technology, Inc. Extension of a private cloud end-point group to a public cloud
US10567344B2 (en) 2016-08-23 2020-02-18 Cisco Technology, Inc. Automatic firewall configuration based on aggregated cloud managed information
US11563695B2 (en) 2016-08-29 2023-01-24 Cisco Technology, Inc. Queue protection using a shared global memory reserve
US12199886B2 (en) 2016-08-29 2025-01-14 Cisco Technology, Inc. Queue protection using a shared global memory reserve
US12413538B2 (en) 2016-08-29 2025-09-09 Cisco Technology, Inc. Queue protection using a shared global memory reserve
US11716288B2 (en) 2016-10-10 2023-08-01 Cisco Technology, Inc. Orchestration system for migrating user data and services based on user information
US10523592B2 (en) 2016-10-10 2019-12-31 Cisco Technology, Inc. Orchestration system for migrating user data and services based on user information
US12432163B2 (en) 2016-10-10 2025-09-30 Cisco Technology, Inc. Orchestration system for migrating user data and services based on user information
US11044162B2 (en) 2016-12-06 2021-06-22 Cisco Technology, Inc. Orchestration of cloud and fog interactions
US10326817B2 (en) 2016-12-20 2019-06-18 Cisco Technology, Inc. System and method for quality-aware recording in large scale collaborate clouds
US10334029B2 (en) 2017-01-10 2019-06-25 Cisco Technology, Inc. Forming neighborhood groups from disperse cloud providers
US10545914B2 (en) 2017-01-17 2020-01-28 Cisco Technology, Inc. Distributed object storage
US10552191B2 (en) 2017-01-26 2020-02-04 Cisco Technology, Inc. Distributed hybrid cloud orchestration model
US10320683B2 (en) 2017-01-30 2019-06-11 Cisco Technology, Inc. Reliable load-balancer using segment routing and real-time application monitoring
US10917351B2 (en) 2017-01-30 2021-02-09 Cisco Technology, Inc. Reliable load-balancer using segment routing and real-time application monitoring
US10671571B2 (en) 2017-01-31 2020-06-02 Cisco Technology, Inc. Fast network performance in containerized environments for network function virtualization
US10243823B1 (en) 2017-02-24 2019-03-26 Cisco Technology, Inc. Techniques for using frame deep loopback capabilities for extended link diagnostics in fibre channel storage area networks
US11252067B2 (en) 2017-02-24 2022-02-15 Cisco Technology, Inc. Techniques for using frame deep loopback capabilities for extended link diagnostics in fibre channel storage area networks
US10254991B2 (en) 2017-03-06 2019-04-09 Cisco Technology, Inc. Storage area network based extended I/O metrics computation for deep insight into application performance
US11005731B2 (en) 2017-04-05 2021-05-11 Cisco Technology, Inc. Estimating model parameters for automatic deployment of scalable micro services
US10623374B2 (en) 2017-06-09 2020-04-14 Microsoft Technology Licensing, Llc Automatic network identification for enhanced communications administration
US10382274B2 (en) 2017-06-26 2019-08-13 Cisco Technology, Inc. System and method for wide area zero-configuration network auto configuration
US10439877B2 (en) 2017-06-26 2019-10-08 Cisco Technology, Inc. Systems and methods for enabling wide area multicast domain name system
US10303534B2 (en) 2017-07-20 2019-05-28 Cisco Technology, Inc. System and method for self-healing of application centric infrastructure fabric memory
US11055159B2 (en) 2017-07-20 2021-07-06 Cisco Technology, Inc. System and method for self-healing of application centric infrastructure fabric memory
US11196632B2 (en) 2017-07-21 2021-12-07 Cisco Technology, Inc. Container telemetry in data center environments with blade servers and switches
US10425288B2 (en) 2017-07-21 2019-09-24 Cisco Technology, Inc. Container telemetry in data center environments with blade servers and switches
US10892940B2 (en) 2017-07-21 2021-01-12 Cisco Technology, Inc. Scalable statistics and analytics mechanisms in cloud networking
US11695640B2 (en) 2017-07-21 2023-07-04 Cisco Technology, Inc. Container telemetry in data center environments with blade servers and switches
US11411799B2 (en) 2017-07-21 2022-08-09 Cisco Technology, Inc. Scalable statistics and analytics mechanisms in cloud networking
US10601693B2 (en) 2017-07-24 2020-03-24 Cisco Technology, Inc. System and method for providing scalable flow monitoring in a data center fabric
US11159412B2 (en) 2017-07-24 2021-10-26 Cisco Technology, Inc. System and method for providing scalable flow monitoring in a data center fabric
US11233721B2 (en) 2017-07-24 2022-01-25 Cisco Technology, Inc. System and method for providing scalable flow monitoring in a data center fabric
US12184486B2 (en) 2017-07-25 2024-12-31 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
US11102065B2 (en) 2017-07-25 2021-08-24 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
US10541866B2 (en) 2017-07-25 2020-01-21 Cisco Technology, Inc. Detecting and resolving multicast traffic performance issues
CN109426549A (en) * 2017-09-01 2019-03-05 英特尔公司 Distribution is interconnected for the accelerator of virtual environment
US10999199B2 (en) 2017-10-03 2021-05-04 Cisco Technology, Inc. Dynamic route profile storage in a hardware trie routing table
US11570105B2 (en) 2017-10-03 2023-01-31 Cisco Technology, Inc. Dynamic route profile storage in a hardware trie routing table
US10404596B2 (en) 2017-10-03 2019-09-03 Cisco Technology, Inc. Dynamic route profile storage in a hardware trie routing table
US10942666B2 (en) 2017-10-13 2021-03-09 Cisco Technology, Inc. Using network device replication in distributed storage clusters
US10866879B2 (en) 2017-10-18 2020-12-15 Cisco Technology, Inc. System and method for graph based monitoring and management of distributed systems
US10353800B2 (en) 2017-10-18 2019-07-16 Cisco Technology, Inc. System and method for graph based monitoring and management of distributed systems
US11481362B2 (en) 2017-11-13 2022-10-25 Cisco Technology, Inc. Using persistent memory to enable restartability of bulk load transactions in cloud databases
US12197396B2 (en) 2017-11-13 2025-01-14 Cisco Technology, Inc. Using persistent memory to enable restartability of bulk load transactions in cloud databases
US10705882B2 (en) 2017-12-21 2020-07-07 Cisco Technology, Inc. System and method for resource placement across clouds for data intensive workloads
US11595474B2 (en) 2017-12-28 2023-02-28 Cisco Technology, Inc. Accelerating data replication using multicast and non-volatile memory enabled nodes
US10511534B2 (en) 2018-04-06 2019-12-17 Cisco Technology, Inc. Stateless distributed load-balancing
US11233737B2 (en) 2018-04-06 2022-01-25 Cisco Technology, Inc. Stateless distributed load-balancing
US11252256B2 (en) 2018-05-29 2022-02-15 Cisco Technology, Inc. System for association of customer information across subscribers
US10728361B2 (en) 2018-05-29 2020-07-28 Cisco Technology, Inc. System for association of customer information across subscribers
US10904322B2 (en) 2018-06-15 2021-01-26 Cisco Technology, Inc. Systems and methods for scaling down cloud-based servers handling secure connections
US10764266B2 (en) 2018-06-19 2020-09-01 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US11552937B2 (en) 2018-06-19 2023-01-10 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US11968198B2 (en) 2018-06-19 2024-04-23 Cisco Technology, Inc. Distributed authentication and authorization for rapid scaling of containerized services
US11019083B2 (en) 2018-06-20 2021-05-25 Cisco Technology, Inc. System for coordinating distributed website analysis
US10819571B2 (en) 2018-06-29 2020-10-27 Cisco Technology, Inc. Network traffic optimization using in-situ notification system
US10904342B2 (en) 2018-07-30 2021-01-26 Cisco Technology, Inc. Container networking using communication tunnels
CN119583366A (en) * 2025-01-24 2025-03-07 南京赛宁信息技术有限公司 A method and system for simulating VPN access in a network range

Similar Documents

Publication Publication Date Title
EP2439637A1 (en) Method and system of providing access to a virtual machine distributed in a hybrid cloud network
US11848800B2 (en) Connecting virtual computer networks with overlapping IP addresses using transit virtual computer network
US11409550B2 (en) Low latency connections to workspaces in a cloud computing environment
Khan et al. Network virtualization: a hypervisor for the Internet?
US9203784B2 (en) Distributed virtual switch architecture for a hybrid cloud
CN105247826B (en) The network function of the network equipment virtualizes
CN103369027B (en) Location aware Virtual Service in mixing cloud environment is equipped with
CN103607430B (en) A kind of method and system of network processes and the network control center
US20180219762A1 (en) Seamless service function chaining across domains
Alshaer An overview of network virtualization and cloud network as a service
US20170195180A1 (en) Methods and systems for managing vpn tunnels
EP4307632B1 (en) Containerized router with virtual networking
EP4293978A1 (en) Hybrid data plane for a containerized router
Papadimitriou et al. Implementing network virtualization for a future internet
WO2023016248A1 (en) Method for intercommunication between data centre cloud network and operator network, and communication apparatus
CN110650077A (en) A method and system for separating L2TP protocol control and forwarding
CN117255019A (en) System, method, and storage medium for virtualizing computing infrastructure
US20240291728A1 (en) Service orchestration in a communication infrastructure with different network domains
US20250007752A1 (en) Edge platform management device, operating method of edge platform management device, and edge gateway device
Lin et al. Software-defined networking (SDN) for cloud applications
CN121151181A (en) A container network configuration method, apparatus, electronic device, and storage medium.
Theodorou Network provisioning in IaaS clouds: a network resource management system
Kempf et al. EPC in the Cloud

Legal Events

Date Code Title Description
AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20120913

17Q First examination report despatched

Effective date: 20180613

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED

18R Application refused

Effective date: 20190606